CVE-2026-33470: CWE-862: Missing Authorization in blakeblackshear frigate
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, a low-privilege authenticated user restricted to one camera can access snapshots from other cameras. This is possible through a chain of two authorization problems: `/api/timeline` returns timeline entries for cameras outside the caller's allowed camera set, then `/api/events/{event_id}/snapshot-clean.webp` declares `Depends(require_camera_access)` but never actually validates `event.camera` after looking up the event. Together, this allows a restricted user to enumerate event IDs from unauthorized cameras and then fetch clean snapshots for those events. Version 0.17.1 fixes the issue.
AI Analysis
Technical Summary
Frigate is an open-source network video recorder (NVR) designed for real-time local object detection on IP cameras. In version 0.17.0, a security vulnerability identified as CVE-2026-33470 arises from missing authorization checks in two API endpoints. First, the /api/timeline endpoint improperly returns timeline entries for cameras beyond the authenticated user's permitted camera set, allowing enumeration of event IDs from unauthorized cameras. Second, the /api/events/{event_id}/snapshot-clean.webp endpoint, which is supposed to enforce camera access restrictions via a dependency on require_camera_access, fails to validate the camera associated with the requested event after event lookup. This authorization bypass enables a low-privilege user, restricted to a single camera, to access clean snapshots of events from other cameras they should not have access to. The vulnerability impacts confidentiality by exposing sensitive video snapshots but does not affect data integrity or system availability. Exploitation requires authenticated access with low privileges but no additional user interaction. The flaw is categorized under CWE-862 (Missing Authorization) and CWE-863 (Incorrect Authorization). The issue was publicly disclosed on March 26, 2026, with a CVSS v3.1 base score of 6.5 (medium severity), reflecting network attack vector, low attack complexity, and high confidentiality impact. The vendor addressed the vulnerability in Frigate version 0.17.1 by correcting the authorization logic to properly restrict access to event snapshots based on camera permissions.
Potential Impact
This vulnerability primarily compromises the confidentiality of video surveillance data by allowing unauthorized users to access snapshots from cameras they are not permitted to view. For organizations relying on Frigate for security monitoring, this could lead to exposure of sensitive visual information, potentially revealing private or proprietary activities, compromising physical security, or violating privacy regulations. Although the vulnerability does not affect data integrity or availability, the unauthorized disclosure of video snapshots can have serious reputational, legal, and operational consequences. Attackers with low-level credentials could exploit this flaw to gather intelligence or conduct surveillance without detection. The impact is especially critical in environments with strict access controls or sensitive surveillance deployments, such as corporate offices, critical infrastructure, or government facilities. Since exploitation requires authentication but no user interaction, insider threats or compromised low-privilege accounts pose a significant risk.
Mitigation Recommendations
Organizations using Frigate version 0.17.0 should immediately upgrade to version 0.17.1 or later, where the authorization checks have been properly implemented. In addition to patching, administrators should audit user permissions to ensure that camera access is correctly restricted and monitor logs for unusual access patterns to event snapshots. Implementing multi-factor authentication (MFA) for user accounts can reduce the risk of credential compromise. Network segmentation and limiting access to the Frigate management interface to trusted networks can further reduce exposure. Regular security assessments and penetration testing should include verification of authorization controls on API endpoints. If upgrading is temporarily not possible, consider restricting access to the affected API endpoints via firewall rules or reverse proxy access controls to prevent unauthorized enumeration and snapshot retrieval.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, Singapore
CVE-2026-33470: CWE-862: Missing Authorization in blakeblackshear frigate
Description
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, a low-privilege authenticated user restricted to one camera can access snapshots from other cameras. This is possible through a chain of two authorization problems: `/api/timeline` returns timeline entries for cameras outside the caller's allowed camera set, then `/api/events/{event_id}/snapshot-clean.webp` declares `Depends(require_camera_access)` but never actually validates `event.camera` after looking up the event. Together, this allows a restricted user to enumerate event IDs from unauthorized cameras and then fetch clean snapshots for those events. Version 0.17.1 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Frigate is an open-source network video recorder (NVR) designed for real-time local object detection on IP cameras. In version 0.17.0, a security vulnerability identified as CVE-2026-33470 arises from missing authorization checks in two API endpoints. First, the /api/timeline endpoint improperly returns timeline entries for cameras beyond the authenticated user's permitted camera set, allowing enumeration of event IDs from unauthorized cameras. Second, the /api/events/{event_id}/snapshot-clean.webp endpoint, which is supposed to enforce camera access restrictions via a dependency on require_camera_access, fails to validate the camera associated with the requested event after event lookup. This authorization bypass enables a low-privilege user, restricted to a single camera, to access clean snapshots of events from other cameras they should not have access to. The vulnerability impacts confidentiality by exposing sensitive video snapshots but does not affect data integrity or system availability. Exploitation requires authenticated access with low privileges but no additional user interaction. The flaw is categorized under CWE-862 (Missing Authorization) and CWE-863 (Incorrect Authorization). The issue was publicly disclosed on March 26, 2026, with a CVSS v3.1 base score of 6.5 (medium severity), reflecting network attack vector, low attack complexity, and high confidentiality impact. The vendor addressed the vulnerability in Frigate version 0.17.1 by correcting the authorization logic to properly restrict access to event snapshots based on camera permissions.
Potential Impact
This vulnerability primarily compromises the confidentiality of video surveillance data by allowing unauthorized users to access snapshots from cameras they are not permitted to view. For organizations relying on Frigate for security monitoring, this could lead to exposure of sensitive visual information, potentially revealing private or proprietary activities, compromising physical security, or violating privacy regulations. Although the vulnerability does not affect data integrity or availability, the unauthorized disclosure of video snapshots can have serious reputational, legal, and operational consequences. Attackers with low-level credentials could exploit this flaw to gather intelligence or conduct surveillance without detection. The impact is especially critical in environments with strict access controls or sensitive surveillance deployments, such as corporate offices, critical infrastructure, or government facilities. Since exploitation requires authentication but no user interaction, insider threats or compromised low-privilege accounts pose a significant risk.
Mitigation Recommendations
Organizations using Frigate version 0.17.0 should immediately upgrade to version 0.17.1 or later, where the authorization checks have been properly implemented. In addition to patching, administrators should audit user permissions to ensure that camera access is correctly restricted and monitor logs for unusual access patterns to event snapshots. Implementing multi-factor authentication (MFA) for user accounts can reduce the risk of credential compromise. Network segmentation and limiting access to the Frigate management interface to trusted networks can further reduce exposure. Regular security assessments and penetration testing should include verification of authorization controls on API endpoints. If upgrading is temporarily not possible, consider restricting access to the affected API endpoints via firewall rules or reverse proxy access controls to prevent unauthorized enumeration and snapshot retrieval.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-20T16:16:48.969Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c569d6f4197a8e3be94d95
Added to database: 3/26/2026, 5:16:06 PM
Last enriched: 3/26/2026, 5:32:47 PM
Last updated: 3/26/2026, 6:03:18 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.